#![no_main] use libfuzzer_sys::fuzz_target; use soliton::verification::verification_phrase; fuzz_target!(|data: &[u8]| { // verification_phrase validates exact size (3200 bytes each). // Fixed split: inputs ≥ 6400 bytes always produce two exact 3200-byte // halves regardless of total length, so the SHA-512 word derivation and // rejection-sampling loop (20-rehash cap) are reachable from any input // of 6400+ bytes. A midpoint split would only reach that path for // inputs of exactly 6400 bytes. const PK_SIZE: usize = 3200; // SOLITON_PUBLIC_KEY_SIZE const MIN: usize = 2 * PK_SIZE; if data.len() < MIN { return; } let _ = verification_phrase(&data[..PK_SIZE], &data[PK_SIZE..MIN]); });